Discover and read the best of Twitter Threads about #opsec

Most recents (24)

#Twitter #ShortenedURLs #Owly #OPSEC
A Brief Thread
-Twitter automatically shortens a URL and users can post a shortened link from or
- This creates two levels of tracking w/2 shortened URLs
- T.CO of Twitter does some analytics & tracking
- will be used as an example of the second short URL tracker. This tracker provides fingerprinting and supercookies to people who click on an URL ImageImage
#OPSEC #Privacy #ShortenedURLS
-@acfou PageXray is a helpful resource to see what type of tracking is occurring with an URL
In this ex. it shows that tracked user to the domain that fingerprints to WordPress that also fingerprints Image
Read 7 tweets
1/10 #Kherson western front update 🧵is finally here.Been working on checking info from local,#OSINT,sat & other sources to produce the most complete picture IMO while still keeping #Opsec.Let's go 🚀

@DefMon3 @neonhandrail @GeoConfirmed @EngstrT @AndrewPerpetua

2/10 First by popular req. a full overview map of the current(8 aug) frontlines west of the #Inhulets river. As we can see there have been some (small) shifts in the overall line. As you can see i have included known 🇷🇺 defensive pos. and some published 🇺🇦 pos. Some details ⬇️
3/10 First we look at the sit. around #Stanislav. 🇷🇺VDV reinforcements arrived 15-7,and started a push toward #Oleksandrivka pushing 🇺🇦 back across the coastal road W and N taking control of the town. 45th Spetnaz are active here. 🇺🇦 are using art. & tank fire to stop the advance
Read 11 tweets
Wie kann man so krass abstürzen? Ken Jepsen ca. 2011Ken Jepsen ca. 2022
Ich glaub' den muss ich mir archivieren...…
Read 297 tweets
#Fingerprinting #SuperCookies
Brief Thread
Other day looked at different definitions- Fingerprinting, Super Cookies, etc. & whether there are variative meanings. Decided to ask @acfou on super cookie identification via PageXRay & sharing insightful response w/ some definitions
#Fingerprinting #SuperCookies
1st some definitions/ source: Modern Socio-technical Perspectives on Privacy edited by Xinru Page, Bart P. Knijnenburg, Pamela Wisniewski, Heather Richter Lipford, Nicholas Proferes, Jennifer A. Z. Romano…
#Fingerprinting #SuperCookies
The pre-mentioned resource also provides some definitions for different types of tracking and fingerprinting and how super cookies and fingerprinting overlap as concepts and can be one and the same.
Read 8 tweets
Squeef: Square Beef.. Or Cueef: Cubed Beef. #ObiWan
"Luke, I've brought you a bowling ball. That's what children like, right?" #ObiWan
Read 24 tweets
⏳…TEN MORE DAYS until MAY 26…⌛️

#TrueTheVote’s Catherine Englebrecht must sit in front of the Georgia Election Board on May 26th to present her evidence shown in the recent documentary #2000MulesMovie


🪡 1/8 ⬇️ 👀
#TTV filed an official complaint with GA Sec of State on 11/30/21 stating they have both VIDEO and GEO-TRACKING data to support their claims 📸 📲

Additionally, they claim to have witness testimony detailing the “Ballot Trafficking” scheme…


🪡 2/X
Within the complaint we meet “John Doe”, claiming he worked for suspect NGO’s as a ballot trafficker 🙉🙊🙈

The subpoena to #TTV demands that they reveal the name of their witness AND his mother… 🕵🏻‍♂️

Could his involvement be easily confirmed thru phone and bank records?

🪡 3/X
Read 8 tweets
#OSINT #OPSEC #Thread #INFOSEC #Gizmodo
A Thread
1. Gizmodo is a part of GoMedia- depicted is an excerpt about their targeted advertising & that they share w/ ad networks Image
#OSINT #OPSEC #Thread #INFOSEC #Gizmodo
2. @acfou PageXRay query shows fingerprinting, tracking from X countries, 512 ad server requests, 485 tracking requests, and 185 other requests. Sample query of some of the trackers indicates possible malicious activity from pivot queries Image
#OSINT #OPSEC #Thread #INFOSEC #Gizmodo
3. Sample Pivot to OTX Alien Vault of a tracker pulled from @acfou PageXRay depicted Image
Read 6 tweets
Gm fam 🙌 I see that you love my recent thread and today I would like to complete it a little bit and post 25 #OpSec tips from my Guide, in other words, let's look at the methodology from a slightly different angle.
This is the Author's methodology❗️

See the thread below 👇

Problem 1

Secure email provider like protonmail or tutanota. Use trusted VPN like or Proton VPN.…

Problem 2

Different emails / different strong passwords. Store them in one place. Never use repeat passwords, especially for accounts with personally identifiable and sensitive information (e.g. Facebook, Gmail, AppleID, Twitter, banks/payments, crypto accounts).
Read 54 tweets
You've been asking me for a long time and finally I decided to write an ultimative thread on an advanced (and authorial, please note) cryptocurrency storage technology 😎

Read carefully, there will be only Spy-level trips 👇

Understand that all sorts of, TrustWallet, MetaM/\sk and other wallets are just interfaces.

Consider cold wallets, personally I do not trust Ledger or Trezor. There is a hardcore version BitLox Ultimate, which is literally stuffed with security-related features, lets the traffic through Tor, and has several levels of encryption:…
Read 33 tweets
By the way, I’ve updated my #OpSec roadmap, see rules number 14 and 20 👇…
On short, there are a lot ways from combinations of SS7 hacks, DNS poisoning, phishing, clipboard attack and social engineering/impersonating. Even possible to combine it with physical attack:…
Read 6 tweets
Spotted a cool app for coercion password. Good for everyday #OpSec

If an intruder forces you to unlock your Android smartphone, you can enter a "coercion password" and Duress will send a broadcast message to the selected recipient that you are in danger.
Also check out my #OpSec guide in which I try to describe threat modelling and OpSec in 25 golden rules 👇…
Read 5 tweets
Play-by-play what really happened and how this "hack" could have been prevented:

1/ Victim is a VC and is used to getting pitch decks via email PDF.

2/ Hacker mailed him a malicious PDF attachment.

3/ PDF had remote code that ran on his PC and compromised his MetaMask.

4/ MetaMask stores your private keys encrypted on your browser. As soon as you put your password in MM, your keys are decrypted and a virus/malware can easily read them then send to someone else.

5/ Hacker used these keys to steal "everything" in this compromised wallet.
What he (and you or your firm) can do to improve Operational Security (#opsec) & protect yourself?

1/ ALWAYS be cautious about attachments shared from people you don't know. The biggest malicious docs are PDFs and JPEGs because they allow malicious code inserts

Read 7 tweets
How #OSINT and #Geolocation is helping the Russian #WARINUKRAINE by helping Russians #Artillery to adjust fire onto targets in #Ukraine.
As an ex-gunner in the Royal Artillery, I will start by defining artillery as ordnance that is capable of long-range indirect fire at a target too distant to be seen. I.e. does not need line of sight to the target. Which includes Mortars, Artillery shells, Rockets and Missiles.
Artillery needs an observer to be effective, whether that is a person on the ground giving adjustments, or electronic means, such as a drone or the like. The observer adjusts the fire by telling the guns adjust the aim left, right or up and down to hit the target.
Read 11 tweets
[𝗧𝗿𝗲̀𝘀 𝗺𝗮𝘂𝘃𝗮𝗶𝘀𝗲 𝗶𝗱𝗲́𝗲 𝗱𝗲 𝗿𝗲𝗷𝗼𝗶𝗻𝗱𝗿𝗲 𝗹𝗮 𝗜𝗧 𝗔𝗿𝗺𝘆...]

Ce n'est guère une prise de position mais juste une mise en garde que je me permets.

Depuis hier 1e des informations majeures est la création de la #ITArmy pour soutenir l'#Ukraine
Le Ministre du digital ukrainien, Mykhailo Fedorov, appelle tous les volontaires à rejoindre ce groupe.

On pourrait penser que c'est une bonne idée mais non... J'ai reçu bcp de messages sur twitter auxquels je ne peux répondre hélas.
Des jeunes entrain d'apprendre le hacking ou voulant devenir hackers qui se sentent investis d'une mission veulent rejoindre les rangs de cette armée cyber.
Read 9 tweets
#OSINT #OPSEC #Ukraine
If collecting info from .RU,.UA, Russian, or related sources cyber threat is high. OSINT professionals already know this. Here are some tips for gathering that type of data safely-
1. Use a VPN
2. Use a VM
3. Collect data w/out opening the URL
#OSINT #OPSEC #Ukraine
4. Use a throw-away device or separate device for research if possible
5. Use separate browsers for containing types of data to a browser session or to not cross-contaminate sessions
#OSINT #OPSEC #Ukraine
6. In some instances researchers may want to tether their phone for that IP versus home IP or a burner w/its own data plan
7. In some instances a public IP may be preferable over a home IP
8. Check a URLs tracking prior to opening
Read 10 tweets
#Belarus has a relatively extensive network of cameras to monitor traffic and weather on the road network.
The huge majority of them stopped updating in the span of 3 hours in the morning of February 19... All basically at the same time. #opsec ?
#Ukraine #Russia #OSINT Image
(not all cameras provided a timestamp of the last image, for those a generic "1 or 2 days ago" was reported as date of last image.)
Windy does a great job aggregating them and storing images :,24.181…
(Belarus gov website is a mess and lacks details about last images)
Read 5 tweets
Okay apparently a troll group called #RamRanchResistance has infiltrated the largest Windsor Trucking Protest channel on Zello called "Convoy for our Freedom Windsor". Had thousands of members. Insider initiated some kind of algorithmic attack #WindsorBlockade #freedomconvoy
That was unbelievable to watch. All day this admin on the "Convoy for our Freedom Windsor" called Medicczar tried 2 talk sense into rabid "anti-vaxxers", "anti-mandate" Canadians & frankly what seemed like alot of Sovereign Citizen Americans who had no skin in the game really.
At some point just over an hour ago things totally went off the rails & dozens of new accnts all starting with "BigTruckxxxxx" & ending with random numbers in letters where the x's are, starting appearing almost every sec. Mods tried 2 block but the channel was eventually overrun
Read 9 tweets
Finland's Defence Forces clearly signals 'Game On'...

...I've been asked almost daily whether Finnish military has done anything recently to raise readiness. My answer has always been a Kimi-like: "yes"

Now its partially visible.
Thread follows.
First a little background: Finnish security authorities like the Finnish Defence Forces (FDF) or Border Guard (BG, Raja) usually follow a ‘Do. Don’t talk.’ approach to communicating.
Talking about operational details is a no-no, with a few exceptions (more below).
So, frequently lots happens ‘behind the curtain’. Why? Because it makes it harder for an adversary (read Russia) to figure out what the FDF knows, doesn’t know, and how it reacts to any given situation (or in fact doesn’t react identically to ‘the same’ situation).
Read 31 tweets
Awesome tip for using honeypot traps as a defence mechanism & #SIEM 🤯

There are three fun techniques for those who are constantly under attack.

One of them is to set up similar honeypots, IP loggers like “grabify dot link” and put a script for notifications.


The second is to set up fake wallets, potential targets and name them tempting for the hacker. If you try to steal money from them (the hacker will probably notice them first), you can get a notification from @TenderlyApp or own script via SMS.

Read 7 tweets
Okay these accusations by Durham that Danchenko lied to the FBI are incredibly sketchy. For example Danchenko is not lying that he didn't know Charles Dolan but rather that Dolan was not one of his sources for the #SteeleDossier. Check out this interview exhibit.
Danchenko in the covert interview thinks the FBI is asking his opinion of Charles Dolan & his interest in Russia as something that could be interpreted as malign. Danchenko essentially laughs. But in actuality FBI is subtly probing Danchenko to c if Dolan was one of his sources
So this is seriously open for interpretation depending on which side of the fence you are on. Durham essentially is saying Dolan must be one of Danchenko's sources & Danchenko is saying no. How that hell is this even legitimate line of inquiry ..besides exposing anonymous sources
Read 15 tweets
Shoshana & I just launched a live blog for #FacebookPapers.

We'll be posting *complete docs* that catch our eye that may not get the full-story treatment anywhere. My first post is of internal chatter about negative Facebook coverage in the press.…
New: A 2019 document shows Facebook staff concerned about its search product having no dedicated process for flagging climate change misinformation.

"...they are using our service to jeopardize the lives of billions..."… #FacebookPapers
Read 24 tweets
I wonder what they told it? Image
@Grady_Booch why the self declaration for OOP?
If anyone tells you that you can't ignore your problems forever, just remember that they are quitters.
Read 976 tweets
A scannable QR code advertisement created by drones above the skies of Shanghai.

Beautiful. Image
Wild to see this post of mine blow up. I think sychronized drone swarms like this are amazing when used for creative displays and new forms of art, which is why I shared that photo. I also like to fly drones for racing and photography. ImageImageImageImage
Join me and @Lawesomesauce on a @bitrefill #TwitterSpaces tomorrow (Monday) at 1pm EST if you'd like to talk about #drone tech and how it intersects with #infosec and #opsec! Image
Read 4 tweets

Related hashtags

Did Thread Reader help you today?

Support us! We are indie developers!

This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!